The so-called “darknet” technologies that layer invisible, private networks on top of the internet have legitimate security applications for business, according to Greg Jones, director of Digital Assurance.

Download this free guide

The importance of web security

Join us as we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

Jones said businesses seeking anonymity were likely to embrace the 802.11s standard that will provide a supplier-neutral way to build wireless mesh networks over a wireless local area network.

“This standard will provide a robust meshed wireless network. Think ad hoc routing. This could be the future of machine to machine (M2M) communications. Definitely something to watch,” he said.

In the more immediate future, Jones predicted organisations will look to private Tor clouds as a way of providing security without needing to run a Tor hidden service.

“This means corporate clients can be configured to connect to a private Tor cloud rather than a Tor network, and will look like a connection to an ordinary website,” he said.

Dark market activity

While some researchers have suggested there are around 100,000 hidden services running on the darknet, Jones said the real figure is between 10,000 and 15,000.

The bulk of those hidden services are person-to-person torrent tracking or “chat” services that do not carry any actual content.

However, research carried out by Jones revealed around 12 “significant” dark markets and hundreds of smaller ones conducting business transactions worth around £20m a month, mainly using bitcoins.

A live demonstration revealed that the top items on offer include illicit and prescription drugs, stolen credit card details, PayPal credentials, Netflix accounts, fake passports and identity documents, a wide range of firearms, and kits for generating fake bank statements and utility bills.

Jones has logged around 4,000 dark market sellers in the past three years, but estimated that only around 2,500 sellers are active at any given time.

Big target for hackers

Although many of the goods on offer have been stolen by hackers, hacking itself is rife on the darknet. Jones reported an “insane” level of hacking in the past 18 months.

“Dark markets are a massive target for hackers because sellers are extremely unlikely to report attacks to authorities and many sites contain large stores of bitcoins in ‘hot wallets’,” he said.

Darknet technologies are free and resilient, and can be used to enable travelling business executives to connect to corporate systems, unseen by state-backed surveillance or espionage systems

Greg Jones, Digital Assurance

In some cases, millions of dollars worth of bitcoins have been stolen, such as the theft that forced the closure of Sheep Marketplace in December 2013. Estimates range from $6m to $120m.

Another motive is to knock out competitors. In one case, a dark market operator undermined confidence in a competitor’s security by publishing a list of users, forcing the competitor to close within three weeks.

Risk of losing anonymity

“De-anonymisation is one cyber threat that legitimate websites do not face, but for dark markets it is probably the biggest risk,” said Jones.

Speculation over how the international law enforcement operation Onymous was able to take down around 27 websites linked to more than 400 hidden services URLs in November 2014 has highlighted a number of potential Tor weaknesses that may have been exploited by cyber cops.

However, Jones observes that like security vulnerabilities in the world of legitimate online business, technology is likely to have been only one element of the operation’s success.

“Although the details of what enabled the take-down are still unknown, it probably involved a mix of technical and human manipulation or infiltration,” he said.

1 comment

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy